Control systems are exposed to unintentional errors, deliberate intrusions, false data injection attacks, and various other disruptions. In this paper we propose, justify, and illustrate a rule of thumb for detecting, or confirming the absence of, such disruptions. To facilitate the use of the rule, we rigorously discuss background results that delineate the boundaries of the rule's applicability. We also discuss ways to further widen the applicability of the proposed intrusion-detection methodology.
Original languageEnglish
Pages (from-to)1285-1304
Number of pages20
JournalJournal of Statistics & Management Systems
Volume23
Issue number8
Early online date3 Jul 2020
DOIs
StatePublished - 2020

    Scopus subject areas

  • Mathematics(all)

    Research areas

  • Control system, transfer function, Intrusion, False data injection, concomitant, Vulnerability, Transfer function, Cntrol system, Transfer Function, Control System, Concomitant, False Data Injection

ID: 45753501